Добірка наукової літератури з теми "Information security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Information security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Information security"
Shumilina, Vera, and Alexander Kim. "MODERN INFORMATION SECURITY AND INFORMATION SECURITY." Science & World 2022, no. 3 (August 30, 2022): 96–100. http://dx.doi.org/10.26526/2307-9401-2022-3-96-100.
Повний текст джерелаImai, Hideki. "Information security. 1. Information security and cryptography." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1285–90. http://dx.doi.org/10.3169/itej1978.42.1285.
Повний текст джерелаNamba, Seiichi. "Information security. 2. Information security in broadcasting." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1291–98. http://dx.doi.org/10.3169/itej1978.42.1291.
Повний текст джерелаKoyama, Kenji. "Information security. 3. Information security for communications." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1299–306. http://dx.doi.org/10.3169/itej1978.42.1299.
Повний текст джерелаMatsumoto, Tsutomu. "Information security. 4. Information security in network." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1307–13. http://dx.doi.org/10.3169/itej1978.42.1307.
Повний текст джерелаHumaidi, Norshima, and Vimala Balakrishnan. "Leadership Styles and Information Security Compliance Behavior: The Mediator Effect of Information Security Awareness." International Journal of Information and Education Technology 5, no. 4 (2015): 311–18. http://dx.doi.org/10.7763/ijiet.2015.v5.522.
Повний текст джерелаAdambaevich, Khabibullaev Hikmat. "ISSUES OF ENSURING INFORMATION SECURITY IN INFORMATION FACILITIES." European International Journal of Multidisciplinary Research and Management Studies 02, no. 10 (October 11, 2022): 281–83. http://dx.doi.org/10.55640/eijmrms-02-10-52.
Повний текст джерелаErceg, Aleksandar. "Information security." Tehnički glasnik 13, no. 2 (June 17, 2019): 123–28. http://dx.doi.org/10.31803/tg-20180717222848.
Повний текст джерелаKaushik, Saurav. "Information Security." International Journal for Research in Applied Science and Engineering Technology 8, no. 5 (May 31, 2020): 2779–83. http://dx.doi.org/10.22214/ijraset.2020.5468.
Повний текст джерелаYamamoto, Akitomo. "Information Security." IEEJ Transactions on Electronics, Information and Systems 107, no. 9 (1987): 804–9. http://dx.doi.org/10.1541/ieejeiss1987.107.9_804.
Повний текст джерелаДисертації з теми "Information security"
Tyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.
Повний текст джерелаÅhlfeldt, Rose-Mharie. "Information Security in Home Healthcare." Thesis, Högskolan i Skövde, Institutionen för datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-618.
Повний текст джерелаYucel, Okan. "Information System Security." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/4/1260303/index.pdf.
Повний текст джерелаSaltysh, S. "Information security: passwords." Thesis, Sumy State University, 2014. http://essuir.sumdu.edu.ua/handle/123456789/45430.
Повний текст джерелаBurkhead, Randy L. "A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management." Thesis, Capella University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3682325.
Повний текст джерелаThe security of digital information is paramount to the success of private organizations. Violating that security is a multi-billion-dollar criminal business and exploiting these vulnerabilities creates a single point of failure for operations. Thus, understanding the detection, identification, and response to information security incidents is critical to protecting all levels of infrastructure. The lived experiences of current professionals indicate 10 unique themes in regards to how information security incidents are addressed in private organizations. These unique themes led the researcher to offer several conclusions related to the importance of planning, communication, offensive capabilities, and integration with third-party organizations. Information security incident management is accomplished as an escalation process with multiple decision points leading to a restoration of services or security. The source of the incident is not often sought beyond the first external IP address but their purpose and intent are essential to information security incident management. The key lessons learned from professionals include the importance of having a plan, training the plan, and incorporating the human elements of security into information security incident response. Penetration testing as well a knowledge about threat and attack patterns are important to information security incident management for detection, containment, and remediation. External organizations play a major role in the management of information security incidents as fear, incompetence, and jurisdictional issues keep the private sector from working with government, military, and law enforcement organizations. These themes have wide reaching implications for practical application and future research projects.
Alfawaz, Salahuddin M. "Information security management : a case study of an information security culture." Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/41777/1/Salahuddin_Alfawaz_Thesis.pdf.
Повний текст джерелаLund, Per. "Information Security Awareness amongst students : A study about information security awareness at universities." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-70873.
Повний текст джерелаRastogi, Rahul. "Information security service management : a service management approach to information security management." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.
Повний текст джерелаBjörck, Fredrik. "Discovering information security management /." Stockholm : Department of Computer and Systems Sciences, Stockholm University, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-718.
Повний текст джерелаTalib, Shuhaili. "Personalising information security education." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/2896.
Повний текст джерелаКниги з теми "Information security"
Drevin, Lynette, Suné Von Solms, and Marianthi Theocharidou, eds. Information Security Education. Information Security in Action. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59291-2.
Повний текст джерелаLiu, Joseph K., Sokratis Katsikas, Weizhi Meng, Willy Susilo, and Rolly Intan, eds. Information Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91356-4.
Повний текст джерелаLongley, Dennis, Michael Shain, and William Caelli. Information Security. London: Palgrave Macmillan UK, 1992. http://dx.doi.org/10.1007/978-1-349-12209-7.
Повний текст джерелаMambo, Masahiro, and Yuliang Zheng. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-47790-x.
Повний текст джерелаStamp, Mark. Information Security. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2005. http://dx.doi.org/10.1002/0471744190.
Повний текст джерелаChow, Sherman S. M., Jan Camenisch, Lucas C. K. Hui, and Siu Ming Yiu, eds. Information Security. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13257-0.
Повний текст джерелаChan, Agnes Hui, and Virgil Gligor, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45811-5.
Повний текст джерелаGollmann, Dieter, and Felix C. Freiling, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33383-5.
Повний текст джерелаSusilo, Willy, Robert H. Deng, Fuchun Guo, Yannan Li, and Rolly Intan, eds. Information Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62974-8.
Повний текст джерелаChen, Liqun, Mark Manulis, and Steve Schneider, eds. Information Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99136-8.
Повний текст джерелаЧастини книг з теми "Information security"
von Solms, S. H., and R. von Solms. "Information Security and Information Security Governance." In Information Security Governance, 1–11. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-79984-1_3.
Повний текст джерелаFernando, Anjana, and Lakmal Warusawithana. "Information Security." In Beginning Ballerina Programming, 227–68. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5139-3_9.
Повний текст джерелаStanley, Richard. "Information Security." In Cybercrimes: A Multidisciplinary Analysis, 95–126. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13547-7_5.
Повний текст джерелаWeik, Martin H. "information security." In Computer Science and Communications Dictionary, 778. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_8957.
Повний текст джерелаFox, Richard. "Information Security." In Information Technology, 329–66. Second edition. | Boca Raton : CRC Press, 2020.: Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781003050971-9.
Повний текст джерелаEdward, Y. Uechi. "Information Security." In Public Service Information Technology, 155–82. Boca Raton : Taylor & Francis, 2020.: Productivity Press, 2019. http://dx.doi.org/10.4324/9780429059568-7.
Повний текст джерелаReveron, Derek S., and Kathleen A. Mahoney-Norris. "Information Security." In Human and National Security, 181–201. Second edition. | New York : Routledge, 2018. | First edition published: Human security in a borderless world. Philadelphia, PA : Westview Press, c2011.: Routledge, 2018. http://dx.doi.org/10.4324/9780429503726-9.
Повний текст джерелаWeik, Martin H. "security information." In Computer Science and Communications Dictionary, 1535. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16812.
Повний текст джерелаSheppey, Terence, and Ross McGill. "Information Security." In Sarbanes-Oxley, 277–96. London: Palgrave Macmillan UK, 2007. http://dx.doi.org/10.1057/9780230598027_22.
Повний текст джерелаNeel, Andrew J. "Information Security." In Encyclopedia of Sciences and Religions, 1055–58. Dordrecht: Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-1-4020-8265-8_1220.
Повний текст джерелаТези доповідей конференцій з теми "Information security"
Neogy, Sarmistha. "Information security." In IML 2017: International Conference on Internet of Things and Machine Learning. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3109761.3158397.
Повний текст джерела"Information Security." In 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus). IEEE, 2021. http://dx.doi.org/10.1109/elconrus51938.2021.9396494.
Повний текст джерела"Information security." In 2016 8th International Symposium on Telecommunications (IST). IEEE, 2016. http://dx.doi.org/10.1109/istel.2016.7881786.
Повний текст джерелаCarroll, Michael D. "Information security." In the 3rd annual conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1231047.1231082.
Повний текст джерелаСелейдарян, Элина Михайловна, and Матвей Артёмович Лысенко. "INFORMATION SECURITY." In Национальная безопасность России: актуальные аспекты: сборник избранных статей Всероссийской научно-практической конференции (СанктПетербург, Май 2022). Crossref, 2022. http://dx.doi.org/10.37539/nb197.2022.70.89.006.
Повний текст джерелаAlkhudhayr, Fatimah, Shouq Alfarraj, Buthina Aljameeli, and Salim Elkhdiri. "Information Security:A Review of Information Security Issues and Techniques." In 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS). IEEE, 2019. http://dx.doi.org/10.1109/cais.2019.8769504.
Повний текст джерелаWu, Yue, and Katalin Takacs-Gyorgy. "Information security of food security." In 2023 IEEE 21st World Symposium on Applied Machine Intelligence and Informatics (SAMI). IEEE, 2023. http://dx.doi.org/10.1109/sami58000.2023.10044492.
Повний текст джерелаAmankwa, Eric, Marianne Loock, and Elmarie Kritzinger. "A conceptual analysis of information security education, information security training and information security awareness definitions." In 2014 9th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2014. http://dx.doi.org/10.1109/icitst.2014.7038814.
Повний текст джерелаColbaugh, Richard, Kristin Glass, and Travis Bauer. "Dynamic information-theoretic measures for security informatics." In 2013 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2013. http://dx.doi.org/10.1109/isi.2013.6578784.
Повний текст джерелаCooper, Michael H. "Information security training." In the ACM SIGUCCS fall conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1629501.1629541.
Повний текст джерелаЗвіти організацій з теми "Information security"
Bowen, P., J. Hash, and M. Wilson. Information security handbook :. Gaithersburg, MD: National Institute of Standards and Technology, 2006. http://dx.doi.org/10.6028/nist.sp.800-100.
Повний текст джерелаTsang, Wai, Karen Burkardsmaier, and Ed Scheidt. Information-Centric Security. Fort Belvoir, VA: Defense Technical Information Center, February 2004. http://dx.doi.org/10.21236/ada421985.
Повний текст джерелаYoung, Shelton R., Kimberley A. Caprio, Tilghman A. Schraden, Kathryn L. Palmer, and Walter S. Bohinski. Information System Security: Government Information Security Reform Act Implementation: Defense Security Assistance Management System. Fort Belvoir, VA: Defense Technical Information Center, August 2002. http://dx.doi.org/10.21236/ada407864.
Повний текст джерелаLOGISTICS MANAGEMENT INST MCLEAN VA. FY 2001 DoD Information Security Status for Government Information Security Reform. Fort Belvoir, VA: Defense Technical Information Center, September 2001. http://dx.doi.org/10.21236/ada386363.
Повний текст джерелаKissel, Richard. Small business information security :. Gaithersburg, MD: National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.ir.7621.
Повний текст джерелаLane, Brendan F., and Joseph Johnson. High Security Information System. Fort Belvoir, VA: Defense Technical Information Center, January 2002. http://dx.doi.org/10.21236/ada418505.
Повний текст джерелаQuist, A. S. Security classification of information. Office of Scientific and Technical Information (OSTI), April 1993. http://dx.doi.org/10.2172/6934153.
Повний текст джерелаMoser, William S. The Economics of Information Security. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada404567.
Повний текст джерелаSECRETARY OF THE AIR FORCE WASHINGTON DC. Communications and Information: Computer Security. Fort Belvoir, VA: Defense Technical Information Center, August 2001. http://dx.doi.org/10.21236/ada405011.
Повний текст джерелаRosenthal, David, Peter Samsel, and Cheryl Barbasch. Information Tools for Security Protection. Fort Belvoir, VA: Defense Technical Information Center, November 2002. http://dx.doi.org/10.21236/ada408503.
Повний текст джерела